Tag: Centrify Infrastructure Services

I hope everyone is enjoying a happy and prosperous holiday season. It’s been another very good year at Centrify. We’re growing, we’re the only vendor in the world to hold three simultaneous leadership positions in PIM and IDaaS, and we’re focused (as always) on the thing that makes our company great — our customers. We’re finishing up the last round of updates for Centrify software and services in the calendar year of 2017. This week, I’m happy to announce the general availability of Centrify Infrastructure Services (CIS) 2017.3. CIS is the product formerly known as Centrify Server Suite. The 2017.3…

When reading this year’s “Cisco Midyear Cyber Security Report,” a few things jump out that bear discussion. Vendor Consolidation First, one of the key findings is related to the “fragmented security toolbox,” and from it, having so many point solutions solving for security gaps actually creates problems. If they are layered effectively, integrated fully and managed appropriately, point solutions are a winning approach. But when you look at the number of separate solutions that need individual attention to stay effective, the administrative burden deters from incident response plan. This leads to the report’s conclusion that consolidation of vendors limits this effect….

Drag racing. From 0 to 60 in less than 2 seconds. It’s all about controlled speed. Success depends on maximizing power, minimizing weight and drag, and no obstacles in the way! In IT when the pressure’s on, admins also want to avoid obstacles. They need to get the job done fast whether it’s an OS refresh, new corporate apps rolling out, or fixing a network outage. For this, they too need power (accounts like “root” or “administrator” with superuser rights). SO, just give your admins full rights all the time. Minimize obstacles, bureaucracy, red tape, friction. Jobs get DONE super…

Centrify CEO Tom Kemp, an industry expert in security and infrastructure software, discusses market and technology issues around the disruption occurring in the Identity and Access Management market due to the cloud, mobile and consumerization of IT trends occurring in today's IT environment.